Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, 1977. ,
DOI : 10.1145/359636.359712
, dSpace: TargetLink Embedded Code Generator, 2015.
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, 1982. ,
DOI : 10.1109/SP.1982.10014
The synchronous data flow programming language LUSTRE, Proceedings of the IEEE, 1991. ,
DOI : 10.1109/5.97300
Information Flow Control for Java based on Path Conditions in Dependence Graphs, IEEE International Symposium on Secure Software Engineering, 2006. ,
Static path conditions for Java, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, 2008. ,
DOI : 10.1145/1375696.1375704
Bit-precise formal verification of discrete-time MATLAB/Simulink Models using SMT Solving, 2013 Proceedings of the International Conference on Embedded Software (EMSOFT), 2013. ,
DOI : 10.1109/EMSOFT.2013.6658586
MeMo - Methods of Model Quality, p.MBEES, 2011. ,
Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, 1976. ,
DOI : 10.1145/360248.360252
Validation of measurement software as an application of slicing and constraint solving, Information and Software Technology, vol.40, issue.11-12, 1998. ,
DOI : 10.1016/S0950-5849(98)00090-1
, , 2015.
Translating Discrete Time Simulink to SIGNAL Virginia Tech (2014) 13. NICTA: The MiniZinc Constraint Programming Language, 2014. ,
Slicing MATLAB Simulink models, 2012 34th International Conference on Software Engineering (ICSE), 2012. ,
DOI : 10.1109/ICSE.2012.6227161
Language-based information-flow security. Selected Areas in Communications, IEEE Journal on, 2003. ,
Gecode: Generic constraint development environment, INFORMS Annual Meeting, 2009. ,
Translating discrete-time simulink to lustre, ACM Transactions on Embedded Computing Systems, vol.4, issue.4, 2005. ,
DOI : 10.1145/1113830.1113834
Model Checking Information Flow, 2010. ,
DOI : 10.1007/978-1-4419-1539-9_13